OWASP A05 - Security Misconfiguration

Directory indexing vulnerabilities occur when a web application server is configured to return a listing of files in a web accessible directory in response to an HTTP request for that directory. Direc...

Application misconfiguration vulnerabilities occur when an application is not configured properly by the user. Examples include weak passwords, weak access control permissions, exposed configuration s...

Server misconfiguration vulnerabilities occur when the server that hosts the web application is not configured properly.
Some types of server misconfiguration might not provide any dangerous capabil...

Improper filesystem permissions vulnerabilities occur when the filesystem permissions are not sufficiently restricted, either as a result of the application not setting strict enough permissions or th...